General
-
Target
lol.bat
-
Size
279KB
-
Sample
241109-tqdgesxfpa
-
MD5
b5c81dca8f6b148790d14c93ba1788d4
-
SHA1
11fa7bdf65ac8b835b27c895f3d3e357f87a28f2
-
SHA256
7772e47f23947ab8ec3ccd03173e02e73252b906cc780681447049e12d4cb9cb
-
SHA512
14bb171192854a481b7d26ec69e3dc7ffbe55755c3191629697298553ce919d5b1bd4719531b271304a530e5a01478bad0167f6fb66ae8d869da1f34b8713b51
-
SSDEEP
6144:5toA7r23ZOt+yxLqRvs+wAbTXJuE/SzXm3+gK+4QpTz:4AsOkmqTPbTJuEcmut+ppTz
Static task
static1
Behavioral task
behavioral1
Sample
lol.bat
Resource
win7-20240729-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:32758
pressure-continuous.gl.at.ply.gg:32758
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
lol.bat
-
Size
279KB
-
MD5
b5c81dca8f6b148790d14c93ba1788d4
-
SHA1
11fa7bdf65ac8b835b27c895f3d3e357f87a28f2
-
SHA256
7772e47f23947ab8ec3ccd03173e02e73252b906cc780681447049e12d4cb9cb
-
SHA512
14bb171192854a481b7d26ec69e3dc7ffbe55755c3191629697298553ce919d5b1bd4719531b271304a530e5a01478bad0167f6fb66ae8d869da1f34b8713b51
-
SSDEEP
6144:5toA7r23ZOt+yxLqRvs+wAbTXJuE/SzXm3+gK+4QpTz:4AsOkmqTPbTJuEcmut+ppTz
-
Asyncrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-